Try Our New BETA Version
(navigation image)
Home Animation & Cartoons | Arts & Music | Community Video | Computers & Technology | Cultural & Academic Films | Ephemeral Films | Movies | News & Public Affairs | Prelinger Archives | Spirituality & Religion | Sports Videos | Television | Videogame Videos | Vlogs | Youth Media
Search: Advanced Search
Anonymous User (login or join us)

View movie

item imageitem imageitem imageitem image

View thumbnails

Play / Download (help[help])

(64.4 M)Ogg Video
(90.2 M)h.264
(173.6 M)QuickTime

All Files: HTTPS Torrent (2/0)
[Attribution-Share Alike 3.0]



Gananand KiniDay 2 Part 2: Introduction to ARM

something has gone horribly wrong 8-p
Prefer flash? · Embed · Questions/Feedback?

Class materials at
Follow us on Twitter for class news @OpenSecTraining.

ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimize and debug software stacks running on them. This class builds on the Intro to x86 class and tries to provide parallels and differences between the two processor architectures wherever possible while focusing on the ARM instruction set, some of the ARM processor features, and how software works and runs on the ARM processor. 
In order to demonstrate these features, labs are made available as part of a virtual environment with an ARM emulator run using QEMU. These labs include:
- A simple fibonacci sequence generator in assembly that demonstrates use of recursion with the use of control flow instructions such as bl, beq, the cmp instruction, arithmetic operations such as add, subs and finally stack operation using push and pop.
- An ARM version of the CMU Bomb Lab from CMU's Introduction to Computer Systems class that demonstrates the use of the GNU Debugger for reverse engineering binaries on the ARM platform.
- A simple Interrupts lab that demonstrates the implementation of an emulated IRQ interrupt handler in QEMU where we take keyboard input and add 1 to the character and then output it.
- A control flow hijack lab where we perform the same hijack demonstrated by Itzhak Avraham at Blackhat in 2012 using Return-Oriented-Programming (ROP) in the ARM emulator
- An Atomic instructions lab where we implement a sample mutex in conjunction with an application using threading to emulate atomic instructions that are included with the ARM instruction set.
Intro x86 is a pre-requisite to this class and will help in understand the similarities and differences between the two architectures as well as understand some of the basic program operations that work similarly on both platforms.

This movie is part of the collection:

Producer: Gananand Kini
Audio/Visual: sound, color
Keywords:; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes

Creative Commons license: Attribution-Share Alike 3.0

Individual Files

Movie Files Thumbnail Animated GIF QuickTime h.264 Ogg Video 5.4 KB 
181.3 KB 
173.6 MB 
90.2 MB 
64.4 MB 
Information FormatSize
Day2Part2IntroductionToArm_files.xml Metadata [file] 
Day2Part2IntroductionToArm_meta.xml Metadata 3.1 KB 
Other Files Archive BitTorrent
Day2Part2IntroductionToArm_archive.torrent 14.8 KB 

Be the first to write a review
Downloaded 917 times

Terms of Use (31 Dec 2014)